Sciweavers

10539 search results - page 2085 / 2108
» On L
Sort
View
JUCS
2010
114views more  JUCS 2010»
13 years 2 months ago
On Reliable Platform Configuration Change Reporting Mechanisms for Trusted Computing Enabled Platforms
: One of the most important use-cases of Trusted Computing is Remote Attestation. It allows platforms to get a trustworthy proof of the loaded software and current configuration of...
Kurt Dietrich
LOGCOM
2010
152views more  LOGCOM 2010»
13 years 2 months ago
Constructive Logic with Strong Negation as a Substructural Logic
Gentzen systems are introduced for Spinks and Veroff's substructural logic corresponding to constructive logic with strong negation, and some logics in its vicinity. It has b...
Manuela Busaniche, Roberto Cignoli
NAR
2010
165views more  NAR 2010»
13 years 2 months ago
PhosPhAt: the Arabidopsis thaliana phosphorylation site database. An update
: Growth and development of plants depends on uptake and assimilation of nutrients. Many assimilation products of macronutrients are not only essential for plant growth but also ha...
Pawel Durek, Robert Schmidt, Joshua L. Heazlewood,...
PAMI
2010
273views more  PAMI 2010»
13 years 2 months ago
Correspondence-Free Activity Analysis and Scene Modeling in Multiple Camera Views
We propose a novel approach for activity analysis in multiple synchronized but uncalibrated static camera views. In this paper, we refer to activities as motion patterns of objects...
Xiaogang Wang, Kinh Tieu, W. Eric L. Grimson
PE
2010
Springer
175views Optimization» more  PE 2010»
13 years 2 months ago
Generalized ERSS tree model: Revisiting working sets
Accurately characterizing the resource usage of an application at various levels in the memory hierarchy has been a long-standing research problem. Existing characterization studi...
Ricardo Koller, Akshat Verma, Raju Rangaswami
« Prev « First page 2085 / 2108 Last » Next »